Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireAccess ManagementIdentity Management

Nearly Half of Americans Likely to Use Voice Recognition for Personal Verification

April 11, 2018

A new Pindrop survey has found the vast majority (81%) believe there are benefits to using voice recognition as a form of personal verification.

Not only do 81% find benefits, said the survey, but nearly half of Americans (48%) said they would be likely to use voice recognition as a form of personal verification.

The study also assessed consumer engagement with financial institutions, retailers, healthcare providers and other major omnichannel organizations. Findings indicate that roughly half of Americans contacted financial service companies (49%), healthcare companies (59%), insurance companies (54%), and telco companies (60%), via phone with a customer service inquiry in the last 12 months. About one in ten Americans contacted healthcare companies (15%), insurance companies (9%) and financial service companies (11%) via phone more than five times per year.

Consumer Frustration

Consumers may be dissatisfied with current verification methods used to protect their personal information. More than one in four Americans who have accessed an account at a healthcare company (28%) or TV/telecom company (27%) by phone expressed frustration with their experience. Among those who have found it difficult to access their accounts* by phone, burdensome requirements to answer numerous identity verification questions is the cause of this difficulty for over one quarter of them (28%).  Additionally, nearly one in five (18%) have found it difficult because they forgot the answers to their security questions and were locked out of their accounts.

“We are ushering in a new era of passive voice authentication that will create opportunities for brands to interact with their customers,” said Scott Rose, SVP of Product, Pindrop. “As consumers go beyond their phones and increase interactions with voice activated devices, it is crucial not to confuse personalization with security and identification.”

Fear, Uncertainty, and Doubt Abound

One key finding in the study highlights that roughly four out of five Americans (81%) believe there are benefits to using voice recognition as a form of personal verification. However, concerns remain as 94% believe there are drawbacks to this process. The top reasons for concern include:

  • 61%: May not work well because of background noise (channel independence)
  • 60%: May not work accurately every time (low EER)
  • 48%: Voice can be cloned and used against them (voice spoofing)
  • 43%: May have difficulty recognizing accents
  • 39%: May not be secure
  • 36%: Requires you to speak loudly and clearly (channel independence)
  • 31%: Lack of info on how voice as personal verification works

“In January, Pindrop released the first-of-its-kind Deep Voice™ biometric engine that is able to recognize a consumer by their voice, even with short command-like utterances in a passive manner,” Rose said. “Pindrop®Labs first looked at the limitations of current voice biometrics and specifically designed a voice biometric engine, in a deep neural architecture, that  addresses the top consumer concerns such as channel independence, the emerging threat of voice synthesis and accuracy rates.”

The Frictionless Conversational Economy

In the emerging conversational economy, brands are reimagining voice activated consumer experiences. Enterprise level security and multi-factor authentication is the necessary next step for all industries creating new opportunities for frictionless customer experiences. As more channels become voice-activated, fraudsters will leverage emerging technologies such as voice synthesis to impersonate consumers. Today, voice fraud costs organizations in the U.S. $14 billion each year within call centers alone.

KEYWORDS: identity (ID) management verification voice recognition

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber6-900px.jpg

    Nearly Half of Americans Willing to Give Brands a Pass for a Data Breach

    See More
  • CCPA california privacy requests cost companies much time and money

    Nearly half of privacy requests last year were to stop the sale of personal data

    See More
  • eye-scan1-900px.jpg

    More Than Half of U.S. Adults Trust Law Enforcement to Use Facial Recognition Responsibly

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing